An advanced approach for modeling and detecting software vulnerabilities

نویسندگان

  • Nahid Shahmehri
  • Amel Mammar
  • Edgardo Montes de Oca
  • David Byers
  • Ana R. Cavalli
  • Shanai Ardi
  • Willy Jimenez
چکیده

Context. Passive testing is a technique in which traces collected from the execution of a system under test are examined for evidence of flaws in the system. Objective. In this paper we present a method for detecting the presence of security vulnerabilities by detecting evidence of their causes in execution traces. This is a new approach to security vulnerability detection. Method. Our method uses formal models of vulnerability causes, known as security goal models and vulnerability detection conditions (VDCs). The former are used to identify the causes of vulnerabilities and model their dependencies, and the latter to give a formal interpretation that is suitable for vulnerability detection using passive testing techniques. We have implemented modeling tools for security goal models and vulnerability detection conditions, as well as TestInv-Code, a tool that checks execution traces of compiled programs for evidence of VDCs. Results. We present the full definitions of security goal models and vulnerability detection conditions, as well as structured methods for creating both. We describe the design and implementation of TestInv-Code. Finally we show results obtained from running TestInv-Code to detect typical vulnerabilities in several open source projects. By testing versions with known vulnerabilities, we can quantify the effectiveness of the approach. Conclusion. Although the current implementation has some limitations, passive testing for vulnerability detection works well, and using models as the basis for testing ensures that users of the testing tool can easily extend it to handle new vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Cloud Privacy Threat Modeling

Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) metho...

متن کامل

Optimal SQUID based non-destructive test for detecting sub-surface defects with the help of advanced SQUID superconducting sensors and an experimental approach for optimal production method of these sensors from the YBCO superconductor materials

The conventional eddy current method for non-destructive inspection of welding joints has limitations that can examine defects to a certain depth below the surface of the sample and is not suitable for determining deep defects. This limitation can be overcome using the SQUID superconducting sensors. The nonstoichiometric composition of YBCO due to its superconducting temperature and desired cri...

متن کامل

Optimal SQUID based non-destructive test for detecting sub-surface defects with the help of advanced SQUID superconducting sensors and an experimental approach for optimal production method of these sensors from the YBCO superconductor materials

The conventional eddy current method for non-destructive inspection of welding joints has limitations that can examine defects to a certain depth below the surface of the sample and is not suitable for determining deep defects. This limitation can be overcome using the SQUID superconducting sensors. The nonstoichiometric composition of YBCO due to its superconducting temperature and desired cri...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

A Secure Software Architecture Description Language

Security is becoming a more and more important concern for software architecture and software components. Previous modeling approaches provide insufficient support for an indepth treatment of security. This paper argues for a more comprehensive treatment of an important security aspect, access control, at the architecture level. Our approach models security subject, resource, privilege, safegua...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information & Software Technology

دوره 54  شماره 

صفحات  -

تاریخ انتشار 2012